SpeedStream Wireless DSL Gateway
Advanced Features
75
3.
Select the checkboxes next to the corresponding option under the "After enabling the Attack
Detection System, select events below to filter and/or log:" heading.
Note
: You can select the "Filter
all" and "Log all" checkboxes to both select and log all options. Please see the descriptions below for
all of the available options:
•
Same Source and Destination Address
: An outside device can send a SYN (synchronize)
packet to a host with the same source and destination address (including port) causing the system
to hang.
•
Broadcast Source Address
: An outside device can send a ping to your gateway broadcast
address using a forged source address. When your system responds to these pings, it is brought
down by echo replies.
•
LAN Source Address on LAN
: An outside device can send a forged source address in an
incoming IP packet to block trace back.
•
Invalid IP Packet Fragment
: An outside device can send fragmented data packets that can bring
down your system.
•
TCP NULL
: An outside device can send an IP packet with the protocol field set to TCP but with
an all null TCP header and data section. If your gateway responds to this attack, it will bring
down your system.
•
TCP FIN
: An outside device can send an attack using TCP FIN. This attack never allows a data
packet to finish transmitting and brings down your system.
•
TCP XMAS
: An outside device can send an attack using TCP packets with all of the flags set.
This causes your system to slow to a halt.
•
Fragmented TCP Packet
: An outside device can send an attack using fragmented packets to
allow an outside user Telnet access to a device on your network.
•
Fragmented TCP Header
: An outside device can send an attack using TCP packets with only a
header and no payload. When numerous packets are sent through the gateway in this manner,
your system slows and halts.
•
Fragmented UDP Header
: An outside device can send an attack using fragmented UDP headers
to bring down a device on your network.
•
Fragmented ICMP Header
: An outside device can send an attack using fragmented ICMP
headers to bring down a device on your network.
•
Inconsistent UDP/IP header lengths
: An outside device can send an attack using inconsistent
UDP/IP headers to bring down a device on your network.
•
Inconsistent IP header lengths
: An outside device can send an attack using changes in the IP
header to zero the fragment offset field. This will be treated as a complete packet when received
and cause your system to halt.
4.
Click
Apply
.